Customizing and securing the route to the platform
Cloud Pak for Data exposes one HTTPS port as the primary access point for the web client and API requests. On Red Hat® OpenShift® Container Platform, the port is exposed as an OpenShift route.
Default route characteristics
cpd, has the following characteristics:- The default route is a re-encrypt route.
This means that encrypted traffic is re-encrypted by OpenShift before it is sent to Cloud Pak for Data.
- The default route uses a self-signed TLS certificate to enable HTTPS connections.
This certificate is untrusted by all HTTPS clients. It is strongly recommended that you replace the self-signed certificate with your own certificate.
Important: If you do not replace the self-signed certificate with your own certificate, the user's browser does not cache the user interface, which can adversely impact performance.
By default, the route to the platform has the following structure:
https://cpd-namespace.apps.OCP-default-domain
Options for customizing the route
cpd-cli
manage
setup-route command to:- Replace the default self-signed certificates with a custom TLS certificate
- Customize the route by:
- Changing the hostname of the default route
- Changing the default route from a re-encrypt route to a passthrough route
Security requirements for each route type
Cloud Pak for Data supports several types of routes. The type of route that you use determines the requirements for the route:
| Route type | Default certificate | Custom TLS certificate and key | CA certificate |
|---|---|---|---|
| Passthrough | By default, the route uses an IBM self-signed certificate. However, it is recommended that you replace this certificate with a custom certificate. |
Supported. If you use a passthrough route, this option is strongly recommended. The files must be in an unencrypted PEM format. |
Not used. |
| Re-encrypt (default) | By default, the route uses the default certificate that is provided by the Red Hat
OpenShift Container Platform ingress controller. However, it is
recommended that you replace this certificate with a custom certificate. For details, see Replacing the default ingress
certificate in the Red Hat
OpenShift Container Platform documentation.
|
Uses the ingress controller settings by default. If you want to use custom certificates,
you must specify:
The files must be in an unencrypted PEM format. |
Uses the ingress controller settings by default. If you want to use custom certificates,
you must specify:
The files must be in an unencrypted PEM format. |
Complete the appropriate tasks for your environment: